{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:55:37Z","timestamp":1761396937663,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819755615"},{"type":"electronic","value":"9789819755622"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5562-2_12","type":"book-chapter","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T07:01:50Z","timestamp":1729926110000},"page":"190-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Searching Untrusted Clouds Meets Multiple Keys: Privacy-Preserving Spatio-Textual Top-k Query"],"prefix":"10.1007","author":[{"given":"Ningning","family":"Cui","sequence":"first","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Mengxiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364331","volume-title":"ObliDB: Oblivious Query Processing for Secure Databases","author":"Saba Eskandarian","year":"2019","unstructured":"Saba Eskandarian, Matei Zaharia. ObliDB: Oblivious Query Processing for Secure Databases. Proc. VLDB Endow, 2019."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Y. Elmehdwi, B. K. Samanthula and W. Jiang. Secure $$k$$-Nearest Neighbor Query over Encrypted Data in Outsourced Environments. ICDE, 2014.","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"N. Cui, X. Yang, B. Wang, et al. SV$$k$$NN: Efficient Secure and Verifiable $$k$$-Nearest Neighbor Query on the Cloud Platform. ICDE, 2020.","DOI":"10.1109\/ICDE48307.2020.00029"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Wang W, Nah Y, Cui B, et al. SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud. DASFAA, 2020.","DOI":"10.1007\/978-3-030-59419-0_18"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"P. Williams, R. Sion, and B. Carbunar. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. CCS, 2008.","DOI":"10.1145\/1455770.1455790"},{"key":"12_CR6","unstructured":"M. S. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. NDSS, 2012."},{"issue":"9","key":"12_CR7","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.1109\/TIFS.2018.2818651","volume":"13","author":"M Du","year":"2018","unstructured":"M. Du, Q. Wang, M. He, et al. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, 2018, pp. 2320-2332.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"X. Meng, H. Zhu and G. Kollios. Top-$$k$$ Query Processing on Encrypted Databases with Strong Security Guarantees. ICDE, 2018.","DOI":"10.1109\/ICDE.2018.00040"},{"issue":"5","key":"12_CR9","first-page":"796","volume":"11","author":"S Su","year":"2018","unstructured":"S. Su, Y. Teng, X. Cheng, et al. Privacy-Preserving Top-$$k$$ Spatial Keyword Queries in Untrusted Cloud Environments. IEEE Transactions on Services Computing, vol. 11, no. 5, 2018, pp. 796-809.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"2","key":"12_CR10","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TDSC.2017.2693969","volume":"16","author":"X Ding","year":"2019","unstructured":"X. Ding, P. Liu and H. Jin. Privacy-Preserving Multi-Keyword Top-$$k$$ Similarity Search over Encrypted Data. IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 2, 2019, pp. 344-357.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"X. Yu, Y. Hu, R. Zhang, et al. Secure Outsourced Top-$$k$$ Selection Queries against Untrusted Cloud Service Providers. IWQOS, 2021.","DOI":"10.1109\/IWQOS52092.2021.9521321"},{"issue":"4","key":"12_CR12","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TNET.2017.2693364","volume":"25","author":"R Li","year":"2017","unstructured":"R. Li, A. X. Liu, S. Xiao, et al. Privacy and Integrity Preserving Top- $$k$$ Query Processing for Two-Tiered Sensor Networks. IEEE\/ACM Transactions on Networking, vol. 25, no. 4, 2017, pp. 2334-2346.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"12_CR13","unstructured":"Ningning Cui, Jianxin Li, Xiaochun Yang, et al. When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries. In ICDE, 2019."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"A. Liu, K. Zhengy, L. Liz, et al. Efficient Secure Similarity Computation on Encrypted Trajectory Data. ICDE, 2015.","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"W. Chen, M. Liu, R. Zhang, et al. Secure Outsourced Skyline Query Processing via Untrusted Cloud Service Pcroviders. IEEE INFOCOM, 2016.","DOI":"10.1109\/INFOCOM.2016.7524509"},{"issue":"1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TETC.2018.2859051","volume":"9","author":"SK Nayak","year":"2021","unstructured":"S. K. Nayak and S. Tripathy. SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys. IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 1, 2021, pp. 414-428.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Boyang Wang, Ming Li, Sherman S, et al. A tale of Two Clouds: Computing on Data Encrypted under Multiple Keys. ICC, 2014.","DOI":"10.1109\/CNS.2014.6997502"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Ximeng Liu, Robert H. D, Kim-Kwang R C, et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit with Multiple Keys. IEEE Trans. Inf. Forensics Secur, vol. 11, no. 11, 2016, pp. 2401-2414.","DOI":"10.1109\/TIFS.2016.2573770"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Cheng K, Wang L, Shen Y, et al. Secure $$k$$-nn Query on Encrypted Cloud Data with Multiple Keys. IEEE Transactions on Big Data. 2017, pp. 1-10.","DOI":"10.1109\/TBDATA.2017.2707552"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Ke Cheng, Yulong Shen, Yongzhi Wang, et al. Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. INFOCOM, 2019.","DOI":"10.1109\/INFOCOM.2019.8737593"},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPDS.2020.3027003","volume":"32","author":"X Liu","year":"2021","unstructured":"X. Liu, G. Yang, W. Susilo, J. Tonien, et al. Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems.  Transactions on Parallel and Distributed Systems, vol. 32, no. 3, 2021, pp. 561-574.","journal-title":"Transactions on Parallel and Distributed Systems"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ins.2020.02.031","volume":"521","author":"Qin Jiang","year":"2020","unstructured":"Qin Jiang, Yong Qi, Saiyu Qi, et al. Pbsx: A Practical Private Boolean Search Using Intel SGX. Information Sciences, Vol. 521, 2020, pp. 174-194.","journal-title":"Information Sciences"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Wang J, Du M, Chow S.S.M. Stargazing in the Dark: Secure Skyline Queries with SGX.  DASFAA, 2020.","DOI":"10.1007\/978-3-030-59419-0_20"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5562-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:59:55Z","timestamp":1748073595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5562-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755615","9789819755622"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5562-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gifu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dasfaa2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}